2010 Conference Publication End-to-end performability analysis for Infrastructure-as-a-Service cloud: An interacting stochastic models approachGhosh, Rahul, Trivedi, Kishor S., Naik, Vijay K. and Kim, Dong Seong (2010). End-to-end performability analysis for Infrastructure-as-a-Service cloud: An interacting stochastic models approach. 16th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2010, Tokyo, Japan, 13 - 15 December 2010. doi: 10.1109/PRDC.2010.30 |
2010 Conference Publication Modeling and analysis of software rejuvenation in a server virtualized systemMachida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2010). Modeling and analysis of software rejuvenation in a server virtualized system. 2010 IEEE Second International Workshop on Software Aging and Rejuvenation, San Jose, CA, United States, 2 November 2010. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/wosar.2010.5722098 |
2010 Conference Publication A Peer-to-Peer RFID Resolution Framework for Supply Chain NetworkShrestha, Safal, Kim, Dong Seong, Lee, Seulki and Park, Jong Sou (2010). A Peer-to-Peer RFID Resolution Framework for Supply Chain Network. 2nd International Conference on Future Networks (ICFN 2010), Sanya Peoples R China, 22-24 January 2010. Los Alamitos, CA United States: IEEE. doi: 10.1109/ICFN.2010.98 |
2010 Conference Publication Spam detection using feature selection and parameters optimizationLee, Sang Min, Kim, Dong Seong, Kim, Ji Ho and Park, Jong Sou (2010). Spam detection using feature selection and parameters optimization. 2010 International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland, 15-18 February 2010. Piscataway, NJ United States: IEEE Engineering in Medicine and Biology Society : IEEE Consumer Electronics Society. doi: 10.1109/CISIS.2010.116 |
2010 Conference Publication Poster abstract: ACT: Attack countermeasure trees for information assurance analysisRoy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2010). Poster abstract: ACT: Attack countermeasure trees for information assurance analysis. 2010 INFOCOM IEEE Conference on Computer Communications Workshops, San Diego CA, United States, 15-19 March 2010. Piscataway, NJ United States: IEEE. doi: 10.1109/INFCOMW.2010.5466633 |
2009 Conference Publication Dependability and security modelsTrivedi, Kishor S., Kim, Dong Seong, Roy, Arpan and Medhi, Deep (2009). Dependability and security models. 2009 7th International Workshop on the Design of Reliable Communication Networks, DRCN 2009, , , October 25, 2009-October 28, 2009. IEEE. doi: 10.1109/DRCN.2009.5340029 |
2009 Conference Publication Detecting DDoS attacks using dispersible traffic matrix and weighted moving averageKim, Tae Hwan, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2009). Detecting DDoS attacks using dispersible traffic matrix and weighted moving average. 3rd International Conference on Information Security and Assurance, ISA 2009, , , June 25, 2009-June 27, 2009. doi: 10.1007/978-3-642-02617-1_30 |
2009 Conference Publication Availability modeling and analysis of a virtualized systemKim, Dong Seong, Machida, Fumio and Trivedi, Kishor S. (2009). Availability modeling and analysis of a virtualized system. 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2009, Shanghai, China, 16-18 November, 2009. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/PRDC.2009.64 |
2009 Conference Publication Resilience in computer systems and networksTrivedi, Kishor S., Kim, Dong Seong and Ghosh, Rahul (2009). Resilience in computer systems and networks. ICCAD 2009, San Jose, California, 2 - 5 November, 2009 . New York, NY, USA: Institute of Electrical and Electronics Engineers Inc.. doi: 10.1145/1687399.1687415 |
2009 Conference Publication Quantitative intrusion intensity assessment using important feature selection and proximity metricsLee, Sang Min, Kim, Dong Seong, Yoon, YoungHyun and Park, Jong Sou (2009). Quantitative intrusion intensity assessment using important feature selection and proximity metrics. 15th Pacific Rim International Symposium on Dependable Computing, Shanghai, China, 16-18 November, 2009. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/PRDC.2009.29 |
2009 Conference Publication Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data centerMachida, Fumio, Kim, Dong Seong, Park, Jong Sou and Trivedi, Kishor S. (2009). Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data center. 2008 IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp), Seattle, WA, United States, 11-14 November, 2008. Piscataway, NJ, United States: IEEE. doi: 10.1109/ISSREW.2008.5355515 |
2008 Conference Publication Achieving availability and survivability in Wireless Sensor Networks by software rejuvenationParvin, Sazia, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2008). Achieving availability and survivability in Wireless Sensor Networks by software rejuvenation. International Conference on Pervasive Services, ICPS 2008 - 4th International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU'08, , , July 6, 2008-July 10, 2008. New York, NY, USA: ACM. doi: 10.1145/1387329.1387332 |
2008 Conference Publication Software rejuvenation and reconfiguration for enhancing survivability of sensor networksKim, Dong Seong, Parvin, Sazia and Park, Jong Sou (2008). Software rejuvenation and reconfiguration for enhancing survivability of sensor networks. doi: 10.1109/WAINA.2008.231 |
2008 Conference Publication Privacy preserving support vector machines in wireless sensor networksKim, Dong Seong, Azim, Muhammad Anwarul and Park, Jong Sou (2008). Privacy preserving support vector machines in wireless sensor networks. 3rd International Conference on Availability, Security, and Reliability, ARES 2008, Barcelona, Spain, 4-7 March 2008. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ARES.2008.151 |
2008 Journal Article Modeling network intrusion detection system using feature selection and parameters optimizationKim, Dong Seong and Park, Jong Sou (2008). Modeling network intrusion detection system using feature selection and parameters optimization. IEICE Transactions on Information and Systems, E91-D (4), 1050-1057. doi: 10.1093/ietisy/e91-d.4.1050 |
2007 Conference Publication Access control and authorization for security of RFID multi-domain using SAML and XACMLKim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). Access control and authorization for security of RFID multi-domain using SAML and XACML. IEEE Computer Society. doi: 10.1109/ICCIAS.2006.295330 |
2007 Journal Article International workshop on Security and Survivability in Distributed Sensor Networks (SSDSN 2007)Park, Jong Sou, Lee, Jang-Se and Kim, Dong Seong (2007). International workshop on Security and Survivability in Distributed Sensor Networks (SSDSN 2007). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4743 LNCS |
2007 Conference Publication A key revocation scheme for mobile sensor networksKim, Dong Seong, Sadi, Mohammed Golam and Park, Jong Sou (2007). A key revocation scheme for mobile sensor networks. 5th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2007 International Workshops: SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN, , , August 29, 2007-August 31, 2007. Springer Verlag. doi: 10.1007/978-3-540-74767-3_5 |
2007 Conference Publication Toward modeling sensor node security using task-role based access control with TinySecMoon, Misun, Kim, Dong Seong and Park, Jong Sou (2007). Toward modeling sensor node security using task-role based access control with TinySec. Springer Verlag. doi: 10.1007/978-3-540-74377-4_77 |
2007 Conference Publication A secure data aggregation scheme for wireless sensor networksRen, Shu Qin, Kim, Dong Seong and Park, Jong Sou (2007). A secure data aggregation scheme for wireless sensor networks. |